Login / Signup
A Practical Guide to Logical Access Voice Presentation Attack Detection.
Xin Wang
Junichi Yamagishi
Published in:
CoRR (2022)
Keyphrases
</>
attack detection
multistage
intrusion detection system
product recommendation
access control
data processing
cyber attacks